EasyManua.ls Logo

Cisco Catalyst 2960-XR - Configuring the Switch-To-RADIUS-Server Communication

Cisco Catalyst 2960-XR
404 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
PurposeCommand or Action
(Optional) Specifies the authentication and encryption key used
between the switch and the RADIUS daemon running on the
RADIUS server.
radius-server key string
Example:
Switch(config)# radius-server key abc1234
Step 7
Specifies the port connected to the client that is to be enabled for
IEEE 802.1x authentication, and enter interface configuration
mode.
interface interface-id
Example:
Switch(config)# interface
Step 8
gigabitethernet1/0/2
(Optional) Sets the port to access mode only if you configured the
RADIUS server in Step 6 and Step 7.
switchport mode access
Example:
Switch(config-if)# switchport mode access
Step 9
Enables 802.1x authentication on the port.authentication port-control auto
Example:
Switch(config-if)# authentication
Step 10
port-control auto
Sets the interface Port Access Entity to act only as an authenticator
and ignore messages meant for a supplicant.
dot1x pae authenticator
Example:
Switch(config-if)# dot1x pae authenticator
Step 11
Returns to privileged EXEC mode.end
Example:
Switch(config-if)# end
Step 12
Configuring the Switch-to-RADIUS-Server Communication
You can globally configure the timeout, retransmission, and encryption key values for all RADIUS servers
by using the radius-server host global configuration command. If you want to configure these options on a
per-server basis, use the radius-server timeout, the radius-server retransmit, and the radius-server key
global configuration commands.
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
OL-29434-01 255
Configuring IEEE 802.1x Port-Based Authentication
Configuring the Switch-to-RADIUS-Server Communication

Table of Contents

Other manuals for Cisco Catalyst 2960-XR

Related product manuals